TROYANOSYVIRUS
Back to CVEs

CVE-2026-30789

CRITICAL
9.8

Description

Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/5/2026
Last Modified3/25/2026
Sourcenvd
Honeypot Sightings0

Affected Products

apple:iphone_osapple:macosgoogle:androidlinux:linux_kernelmicrosoft:windowsrustdesk:rustdesk

Weaknesses (CWE)

CWE-294CWE-916

References

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.